First published: Wed Oct 16 2024(Updated: )
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Linux-PAM | ||
Any of | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10041 is classified as a high severity vulnerability due to the potential for an attacker to exploit it to execute arbitrary code.
To fix CVE-2024-10041, users should update to the latest version of PAM that addresses this vulnerability.
CVE-2024-10041 affects Linux PAM implementations, particularly in environments using vulnerable versions of Red Hat Enterprise Linux.
Users and systems running vulnerable versions of Linux PAM on Red Hat Enterprise Linux are at risk of exploitation due to CVE-2024-10041.
Currently, the recommended approach is to apply updates, as there are no effective workarounds documented for CVE-2024-10041.